An overview of power analysis attacks against field programmable gate arrays
OX Standaert, E Peeters, G Rouvroy… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Since their introduction by Kocher in 1998, power analysis attacks have attracted significant
attention within the cryptographic community. While early works in the field mainly …
attention within the cryptographic community. While early works in the field mainly …
A primer on hardware security: Models, methods, and metrics
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
A tutorial on physical security and side-channel attacks
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …
cryptographic device must face, and attempts to exploit these constraints (running time …
Introduction to differential power analysis
P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …
and other components. As a result, measurements of the power used by actual computers or …
The side-channel metrics cheat sheet
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …
in order to extract its secrets. Many practically relevant advances in the field of side-channel …
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called
side-channel attacks (SCAs). The attacker can gain information by monitoring the power …
side-channel attacks (SCAs). The attacker can gain information by monitoring the power …
Design method for constant power consumption of differential logic circuits
Side channel attacks are a major security concern for smart cards and other embedded
devices. They analyze the variations of the power consumption to find the secret key of the …
devices. They analyze the variations of the power consumption to find the secret key of the …
Securing AES designs against power analysis attacks: a survey
TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
A design flow and evaluation framework for DPA-resistant instruction set extensions
Power-based side channel attacks are a significant security risk, especially for embedded
applications. To improve the security of such devices, protected logic styles have been …
applications. To improve the security of such devices, protected logic styles have been …
Information theoretic evaluation of side-channel resistant logic styles
We propose to apply an information theoretic metric to the evaluation of side-channel
resistant logic styles. Due to the long design and development time required for the physical …
resistant logic styles. Due to the long design and development time required for the physical …